Michael R. Grimaila
Cited by
Cited by
REDO-random excitation and deterministic observation-first commercial experiment
MR Grimaila, S Lee, J Dworak, KM Butler, B Stewart, H Balachandran, ...
Proceedings 17th IEEE VLSI Test Symposium (Cat. No. PR00146), 268-274, 1999
Management of information security: Challenges and research directions
J Choobineh, G Dhillon, MR Grimaila, J Rees
Communications of the Association for Information Systems 20 (1), 57, 2007
The use of attack and protection trees to analyze security for an online banking system
K Edge, R Raines, M Grimaila, R Baldwin, R Bennington, C Reuter
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
Enhancing the security of aircraft surveillance in the next generation air traffic control system
C Finke, J Butts, R Mills, M Grimaila
International Journal of Critical Infrastructure Protection 6 (1), 3-11, 2013
Towards insider threat detection using web server logs
J Myers, MR Grimaila, RF Mills
Proceedings of the 5th Annual Workshop on Cyber Security and Information …, 2009
Defect-oriented testing and defective-part-level prediction
J Dworak, JD Wicker, S Lee, MR Grimaila, MR Mercer, KM Butler, ...
IEEE Design & Test of Computers 18 (1), 31-41, 2001
A survey of state-of-the-art in anonymity metrics
DJ Kelly, RA Raines, MR Grimaila, RO Baldwin, BE Mullins
Proceedings of the 1st ACM workshop on Network Data Anonymization, 31-40, 2008
Post-quantum cryptography: what advancements in quantum computing mean for it professionals
LO Mailloux, CD Lewis II, C Riggs, MR Grimaila
IT professional 18 (5), 42-47, 2016
A new ATPG algorithm to limit test set size and achieve multiple detections of all faults
S Lee, B Cobb, J Dworak, MR Grimaila, MR Mercer
Proceedings 2002 Design, Automation and Test in Europe Conference and …, 2002
Malware target recognition via static heuristics
T Dube, R Raines, G Peterson, K Bauer, M Grimaila, S Rogers
Computers & Security 31 (1), 137-147, 2012
Exploring extant and emerging issues in anonymous networks: A taxonomy and survey of protocols and metrics
D Kelly, R Raines, R Baldwin, M Grimaila, B Mullins
IEEE Communications Surveys & Tutorials 14 (2), 579-606, 2011
A modeling framework for studying quantum key distribution system implementation nonidealities
LO Mailloux, JD Morris, MR Grimaila, DD Hodson, DR Jacques, ...
IEEE Access 3, 110-130, 2015
Enhanced DO-RE-ME based defect level prediction using defect site aggregation-MPG-D
J Dworak, MR Grimaila, S Lee, LC Wang, MR Mercer
Proceedings International Test Conference 2000 (IEEE Cat. No. 00CH37159 …, 2000
Towards an information asset-based defensive cyber damage assessment process
MR Grimaila, LW Fortson
2007 IEEE Symposium on Computational Intelligence in Security and Defense …, 2007
Performance evaluations of quantum key distribution system architectures
LO Mailloux, MR Grimaila, DD Hodson, G Baumgartner, C McLaughlin
IEEE Security & Privacy 13 (1), 30-40, 2015
Improving the global information grid's performance through satellite communications layer enhancements
VP Hubenko, RA Raines, RF Mills, RO Baldwin, BE Mullins, MR Grimaila
IEEE Communications Magazine 44 (11), 66-72, 2006
Comparison of continuous versus pulsed ultraviolet light emitting diode use for the inactivation of Bacillus globigii spores
T Tran, LA Racz, MR Grimaila, M Miller, WF Harper Jr
Water science and technology 70 (9), 1473-1480, 2014
Cyber security and global information assurance: threat analysis and response solutions: threat analysis and response solutions
KJ Knapp
IGI Global, 2009
Wireless intrusion detection and device fingerprinting through preamble manipulation
BW Ramsey, BE Mullins, MA Temple, MR Grimaila
IEEE Transactions on Dependable and Secure Computing 12 (5), 585-596, 2014
Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process.
MR Grimaila, L Fortson, J Sutton
Security and Management, 386-391, 2009
The system can't perform the operation now. Try again later.
Articles 1–20